General discussion

Some Exchange Server Questions

1. You are the Exchange Administrator for your company. A hard disk on one of the Exchange 2000 Server computers fails. The failed hard disk contained the Exchange 2000 System files. The hard disk that contained the transaction log files and exchange databases was not affected by the failure. You replace the failed hard disk. You need to bring the server online, but the only available does not include the system files.

What should you do?

A. Reinstall Exchange 2000 Server by running setup/DomainPrep on the server.B. Reinstall Exchange 2000 Server by running setup/DisasterRecovery on the server.C. Perform a normal installation of Exchange 2000 Server on the server. Create a new database that uses the same database names and paths as the original installation.D. Perform a normal installation of Exchange 2000 Server on the server. Create a storage group that uses the same database names and paths as the original installation.

2. You are the Exchange Administrator for your company. You configure an Exchange 2000 Server computer as a recovery server for single mailbox recovery. You restore the database files from your production exchange server?s online backup to recovery server. You specify the correct names and paths of the databases, but you are not able to mount the databases.

What should you do?

A. Run ISINTEG-patch and then mount the databases.B. Change the transaction log file path to match the transaction log file path of the original server.C. In system manager, select the This database can be overwritten by a restore check box, and then mount the databases.D. Enable circular logging on the storage group, and then restart the information store service.

3. You are the Exchange Administrator for your company. A power failure causes one of the Exchange 2000 Server computers shut down abruptly. You restore power to the exchange server, but the hard disk that contains the transaction log files was damaged. You replace the failed hard disk, but its contents are unrecoverable. When you restart the server, the mailbox store will not mount. You examine the header of the database, and find it to be in an inconsistent state. You back up the exchange database files to a safe location, and now you need to bring the mailbox store online with most current data possible.

Which two actions should you take before mounting the database? (Each correct answer presents part of the solution. Choose two)

A. Run ESEUTIL/R on the database.B. Run ESEUTIL/P on the database.C. Run ESEUTIL/G on the database.D. Run ISINTEG-patch in the MDBData folder.E. Run ISINTEG-fix on the database.

4. You are the Exchange Administrator for your company. The only domain controller on your Windows 2000 network is named as server 1. The only Exchange 2000 Server computer on the network is named server 2. Server 1 fails, and you do not have a backup of the server. You reinstall the domain controller and create a new forest. You need to allow the users in this new forest to access the exchange mailboxes on server2.

What should you do?

A. Run setup/DisasterRecovery on server 2, and then run the mailbox clean up agent on the mailboxes.B. Perform a normal reinstallation of Exchange 2000 Server on Server 2. Configure the new installation to use your original database files, and then reconnect the mailboxes to the new user accounts.C. Join server 2 to the new domain created by server 1, and then run the mailbox cleanup agent on the mailboxes.D. Run EXMERGE against the exchange databases, and save the output to a file. Run setup/DomainPrep on server2, and then import the EXMERGE data files exchange.

5. You are the administrator of an exchange organization that has the Exchange 2000 Server computers.Each server supports 1,500 mailboxes. Some users are using Microsoft outlook 2000, and some are using outlook web access. Recently, you enabled SSL for the default web site on all servers and now require all outlook web access users to connect by using secure HTTP. Users report that all the servers are much slower than they were before you enabled SSL. You must keep additional level of security provided by SSL, but you need to improve server responsiveness.

What should you do?

A. Install an additional Exchange 2000 Server computer to support the secure HTTP users, and configure it as a front-end server.B. Remove SSL and implement TLS on the SMTP and IMAP4 virtual servers.C. Install two additional Exchange 2000 Server computers, and move the outlook web access users to the new server.D. Specify digest authentication on the default web site, and disable integrated Windows authentication.E. Enable Windows 2000 IPSec for the network adapter that supports SQL.

6. You are the Exchange Administrator for your company. The public folders in your organization contain more than 10,000 documents. You want to make it easier and faster for users to find specific documents.

What should you do?

A. Configure a public folder store policy, and add the public folder store to the policy.B. Configure a public folder store policy, and create a full-text index on the public folder store.C. Configure a public folder store policy, and set the replication for the public folder store policy to always run.D. Create a new public folder tree, configure a public folder store policy in this tree, and then create a fulltext index for the public folder store.

7. You are the exchange administrator for your company. You have a mail box store policy for mailbox storage limits in effect for your entire exchange organization. The policy is shown in the exhibit. You add a new exchange 2000 server computer. After the server runs for a few weeks, you notice that several mailboxes are considerably over the limits that are. You need to configure the server to enforce the limits that you set.

What should you do?

A. Configure a new mailbox store policy for the new server.B. Configure a new server policy and add the new server to this policy.C. Set storage limits on the existing mailbox store on the new server.D. Add the default mailbox store on the new server to the mailbox store policy.

8. You are the exchange administrator of your company. Your network is configured as shown in the exhibit. Click the exhibit button. All of your employees connect to your exchange 2000 server computers by using the Microsoft outlook 2000 or outlook express while in office and outlook web access outside the office. You examine the exchange 2000 log files and notice that unknown users on the internet are using your exchange 2000 express server computers to relay SMTP messages to users outside of your company. You need to prevent unauthorized use of your SMTP server while still allowing all of your users to connect to your exchange servers whether the users are in the office or out of the office. In addition, users must still be able to exchange internet e-mail messages with anyone.

What should you do?

A. Create a rule on the firewall to allow only the computers on the LAN to access IP addresses192.169.1.0/24 by using port 25, port 80 and port 110.B. Create a rule on the firewall to allow only the computers on the perimeter network to access IP address 192.168.1.0/24 by using the port 25, port 80 and port 110.C. Configure the SMTP virtual servers to accept SMTP connections from only IP address192.168.1.0/24 and 92.168.2.0/24.D. Configure the SMTP virtual servers to accept connections from anyone and to allow relaying for only IP addresses 192.168.1.0/24.

9. You are the Exchange Administrator for an international company. You have Exchange 2000 Server computers located in 15 countries worldwide. You create a routing group for each country and a routing group connector between each country and the routing group for your main office. The networks in three of these countries are configured with 56-Kbps connections to your WAN. The networks in the other 12 countries have faster connections. You select several public folders and configure them to replicate to the Exchange servers in each of these three countries. You need to configure the public fold replication to occur during non-business hours during those three countries. You also need to prevent the users in these three countries from accessing public folders that have not been replicated to the Exchange servers located in their country.

What should you do?

A. Configure the replication interval for the selected public folders to always run. Configure the connection time for the routing group connectors for each of the three countries and the main office to occur at midnight.B. Configure the replication interval for the selected public folders to run at midnight. Configure the routing group connector for each of three countries to disallow public folder referrals.C. Configure the replication interval for the selected public folder to run at midnight. Configure the routing group connector for the main office to disallow public folder referrals.D. Configure the connection time for the routing group connectors for each of the three countries and the main office to occur at mid night. Set the routing group connector cost to 1.E. Configure the connection time for the routing group connectors for each of the three countries and the main office to occur at mid night. Set the routing group connector cost to 100.

10. You are the network administrator for Contoso Ltd. The company hires a consultant named Amy Jones from Litware Inc. Amy requires access to your network. She prefers to receive all of her e-mail at her ajones@litware.com address. You want Amy?s name to appear in the exchange address book, but you want e-mail messages to be sent only at herlitware.com address.

What should you do?

A. Create a user account that has an exchange mailbox in active directory. Change the SMTP address on the e-mail address tab to the user property sheet to the ajones@litware.com .B. Create an e-mail enabled contact object for Amy Jones and specify the SMTP addressajones@litware.com as the e-mail address in active directory.C. Create a user account that does not have an exchange mailbox in active directory. Use exchange task wizard to assign an SMTP address for ajones@litware.comD. Create a user account that does not have an exchange mailbox in active directory. Enterajones@litware.com as the e-mail address on the General tab of the user property sheet.

11. You are the administrator of seven Exchange 2000 server computers. Each server supports 1,800 mailboxes. Each server?s mailboxes are distributed among five mailbox stores that are located in two storage groups. All mailbox store settings are configured at the default values. Tape backups on all servers occur between 4 A.M and 7 A.M. Users on the night shift report that sending and operating messages often takes several seconds between 1 A.M and 2:30 A.M. Response times are acceptable at other times. You need to improve the response times between 1 A.M and 2:30 A.M.

What should you do?

A. Configure full-text indexing to use a lower amount of system resources.B. Schedule the tape backups to back up each of the mailbox stores at different times across a wider period of time.C. Configure the warning interval of each of the mailbox stores so that warnings run on a custom schedule.D. Configure the maintenance interval of each of the mailboxes stores so that maintenance is staggered across a wider period of time.

12. You are the exchange administrator of Miller textiles. Eric, the manager of human resources wants potential job candidates to send their resumes to jobs@millertextiles.com. Eric wants to prevent employees in other departments from being able to view these messages. Eric creates a Microsoft outlook public folder named job inquires. You need to configure the job inquiries folder to accept e-mail messages from job candidates.

Which two actions should you take? (each correct answer presents part of the solution. Choose two)

A. Enable anonymous access for the job inquiries folder.B. Change the name of the job inquiries folder in the address list to jobs@millertextiles.comC. Change the SMTP address of the job inquiries folder to jobs@millertextiles.comD. Make the job inquiries folder visible in the address list.E. Change the permissions role for the default user to contributor.

13. You are the Exchange Administrator for your company. You recently implemented instant messaging. Some users report that they are unable to logon to the instant messaging server. You verify that you can log on to the server and communicate with other users on the network. You need to configure your network to allow all users to log on to the instant messaging server.

What should you do?

A. Use system manager to change the permissions on the instant messaging protocol. Grant theEveryone group read permission.B. Use system manager to change the permissions on the instant messaging protocol. Grant the user who are unable to log on the execute permission.C. Use the Active Directory users and computers console to select the users who are unable to log on.Run Exchange task wizard and enable instant messaging.D. Use the Active Directory users and computers console to select the users who are unable to log on.Change the protocol settings for these users.

14. You are the Exchange Administrator for your company. Your Exchange 2000 Server computer has a single storage group that contains three mailbox stores and one public folder store. You perform nightly backups, altering between a normal backup of two of the mailbox stores on one night and a normal backup of the other mailbox store and public folder store the following night. You notice hat the transaction log files are not being purged, and they are now consuming nearly all theavailable disk space. You need to continue to perform alternating nightly backups of the mailbox stores and the public folder store, but you must make sure that the transaction log files are not taking up too much of hard disk space.

What should you do?

A. Configure the storage group to disable circular logging.B. Install a new physical disk and move the transaction log files to the new disk.C. Perform a nightly incremental backup of the entire storage group in addition to the current backups.D. Perform differential backups of the mailbox stores and the public folder store instead of normal backups.

15. You are the Exchange Administrator for your company. You are configuring your Exchange 2000 Server computer to support a disaster recovery plan. The server has three hard disks, Disk0, disk1, and disk2. The system files are stored on disk 1. Currently, disk1 and disk2 are not in use. You perform nightly online backups of the exchange databases.You must configure the server to minimize the loss of data if one of the hard disks fails.

What should you do?

A. Place the log files on disk 1. Place the .edb and .stm files on disk 2. Enable circular logging on the exchange server.B. Place the log files on disk 1. Place the .edb files on disk 2. Enable circular logging on the exchange server.C. Place the log files on disk 1. Place the .edb and .stm files on disk 2. Disable circular logging on the exchange server.D. Place the log files on disk 1. Place the .stm files on disk 2. Disable circular logging on the exchange server.

Start or search

Create a new discussion

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

Post type

Subject title

Topic Tags

Select up to 3 tags (1 tag required)

Cloud

Piracy

Security

Apple

Microsoft

IT Employment

Google

Open Source

Mobility

Social Enterprise

Community

Smartphones

Operating Systems

Windows

Mac

Malware

Tablets

Networking

Browser

Hardware

Software

Web Developerment

Linux

Off Topic

Message Body

Track this discussion and email me when there are updates

Please note: Do not post advertisements, offensive material, profanity, or personal attacks. Please remember to be considerate of other members. If you're new to the TechRepublic Forums, please read our TechRepublic Forums FAQ. All submitted content is subject to our Terms Of Use.